{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T17:28:30Z","timestamp":1742923710159,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319607160"},{"type":"electronic","value":"9783319607177"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-60717-7_4","type":"book-chapter","created":{"date-parts":[[2017,8,8]],"date-time":"2017-08-08T14:58:10Z","timestamp":1502204290000},"page":"36-45","source":"Crossref","is-referenced-by-count":1,"title":["A Local-Perturbation Anonymizing Approach to Preserving Community Structure in Released Social Networks"],"prefix":"10.1007","author":[{"given":"Huanjie","family":"Wang","sequence":"first","affiliation":[]},{"given":"Peng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Shan","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Xianxian","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,9]]},"reference":[{"issue":"11","key":"4_CR1","doi-asserted-by":"crossref","first-page":"1376","DOI":"10.14778\/2350229.2350254","volume":"5","author":"P Boldi","year":"2012","unstructured":"Boldi, P., et al.: Injecting uncertainty in graphs for identity obfuscation. Proc. VLDB Endow. 5(11), 1376\u20131387 (2012)","journal-title":"Proc. VLDB Endow."},{"issue":"1","key":"4_CR2","first-page":"55","volume":"8","author":"A Campan","year":"2015","unstructured":"Campan, A., et al.: Preserving communities in anonymized social networks. Trans. Data Priv. 8(1), 55\u201387 (2015)","journal-title":"Trans. Data Priv."},{"key":"4_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-642-01718-6_4","volume-title":"Privacy, Security, and Trust in KDD","author":"A Campan","year":"2009","unstructured":"Campan, A., Truta, T.M.: Data and structural k-anonymity in social networks. In: Bonchi, F., Ferrari, E., Jiang, W., Malin, B. (eds.) PInKDD 2008. LNCS, vol. 5456, pp. 33\u201354. Springer, Heidelberg (2009). doi: 10.1007\/978-3-642-01718-6_4"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Cheng, J., et al.: K-isomorphism: privacy preserving network publication against structural attacks. In: Proceedings of the 2010 ACM SIGMOD International Conference on Management of data. ACM (2010)","DOI":"10.1145\/1807167.1807218"},{"key":"4_CR5","unstructured":"Chester, S., et al.: k-anonymization of social networks by vertex addition. In: ADBIS (2) (2011)"},{"issue":"3","key":"4_CR6","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1016\/j.physrep.2009.11.002","volume":"486","author":"S Fortunato","year":"2010","unstructured":"Fortunato, S.: Community detection in graphs. Phys. Rep. 486(3), 75\u2013174 (2010)","journal-title":"Phys. Rep."},{"key":"4_CR7","doi-asserted-by":"crossref","DOI":"10.1525\/9780520908970","volume-title":"Principles of Group Solidarity","author":"M Hechter","year":"1988","unstructured":"Hechter, M.: Principles of Group Solidarity. University of California Press, Berkeley (1988)"},{"key":"4_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-3-319-06089-7_10","volume-title":"Theory and Applications of Models of Computation","author":"J Jiao","year":"2014","unstructured":"Jiao, J., Liu, P., Li, X.: A personalized privacy preserving method for publishing social network data. In: Gopal, T.V., Agrawal, M., Li, A., Cooper, S.B. (eds.) TAMC 2014. LNCS, vol. 8402, pp. 141\u2013157. Springer, Cham (2014). doi: 10.1007\/978-3-319-06089-7_10"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: 2009 30th IEEE Symposium on Security and Privacy. IEEE (2009)","DOI":"10.1109\/SP.2009.22"},{"issue":"2","key":"4_CR10","doi-asserted-by":"crossref","first-page":"026113","DOI":"10.1103\/PhysRevE.69.026113","volume":"69","author":"ME Newman","year":"2004","unstructured":"Newman, M.E., Girvan, M.: Finding and evaluating community structure in networks. Phys. Rev. E 69(2), 026113 (2004)","journal-title":"Phys. Rev. E"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Tai, C.-H., et al.: Privacy-preserving social network publication against friendship attacks. In: Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM (2011)","DOI":"10.1145\/2020408.2020599"},{"issue":"1","key":"4_CR12","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1109\/TKDE.2013.40","volume":"26","author":"C-H Tai","year":"2014","unstructured":"Tai, C.-H., et al.: Structural diversity for resisting community identification in published social networks. IEEE Trans. Knowl. Data Eng. 26(1), 235\u2013252 (2014)","journal-title":"IEEE Trans. Knowl. Data Eng."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Quality, Reliability, Security and Robustness in Heterogeneous Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-60717-7_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T13:06:42Z","timestamp":1602680802000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-60717-7_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319607160","9783319607177"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-60717-7_4","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2017]]}}}